General

  • Target

    78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe

  • Size

    279KB

  • Sample

    241226-w4cs6avkcn

  • MD5

    78656a9b1ffae68fa53e8bbcb00bf586

  • SHA1

    033b0bd0c08167eb5c785a098d36ba55c05fc468

  • SHA256

    78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50

  • SHA512

    bcd41e5d8326e42e6b12312ce2d5cf2dbd94421c7f481037c4f3f42db6ef7aa935316f11af03a1698d56fc560d88f23aaf6dd65e415e67ef10f29ad8918b425e

  • SSDEEP

    3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfyyzdEpxSJ+LcEZbeD:A/rLVPW0nsP2Xy+TJfzzW7m0qW8VJV

Malware Config

Targets

    • Target

      78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50.exe

    • Size

      279KB

    • MD5

      78656a9b1ffae68fa53e8bbcb00bf586

    • SHA1

      033b0bd0c08167eb5c785a098d36ba55c05fc468

    • SHA256

      78073e3c5b53cdf1c1157ab200b0a3685b9f1b50bffe36c91d6cba1ce22e5c50

    • SHA512

      bcd41e5d8326e42e6b12312ce2d5cf2dbd94421c7f481037c4f3f42db6ef7aa935316f11af03a1698d56fc560d88f23aaf6dd65e415e67ef10f29ad8918b425e

    • SSDEEP

      3072:lOBRrLUOPed9xOi756fJnhsRSK2C22/m4ESZo3XRYzXIkQfyyzdEpxSJ+LcEZbeD:A/rLVPW0nsP2Xy+TJfzzW7m0qW8VJV

    • Detect Vidar Stealer

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks